498 resultados para Insurance engineering
Resumo:
Upgrading old buildings with the evolution of building requirements, this project investigates new approaches that can be applied to strengthen our own heritage buildings using historical and comparative analysis of heritage building restorations locally and abroad. Within the newly developing field of Heritage Engineering, it evaluates the innovative Concrete Overlay technique adapted to building restoration of the Brisbane City Hall. This study aims to extend the application of Concrete Overlay techniques and determine its compatibility specifically to heritage buildings. Concrete overlay involves drilling new reinforcement and placing concrete on top of the existing structure. It is akin to a bone transplant or bone grafting in the case of a human being and has been used by engineers to strengthen newer bridges.
Resumo:
A large proportion (over 12 per cent) of international and non-English speaking background (NESB) postgraduate research students enrol in engineering and information technology (IT) programs in Australian universities. They find themselves in an advanced research culture, and are technically and scientifically challenged early in their programs. This is in addition to cultural, social and religious isolation and linguistic barriers they have to contend with. The project team surveyed this cohort at QUT and UWA, on the hypothesis that they face challenges that are more discipline-specific. The results of the survey indicate that existing supervisory frameworks which are limited to linguistic contexts are not fully assisting these students and supervisors to achieve high quality research. The goal of this project is to extend these supervisory frameworks to a holistic model that will address the unique needs and supervisory issues these students face in engineering and IT disciplines. The model will be useable by all other Australian universities.
Resumo:
This paper, which was part of a larger study, reports on a survey that explored the perceptions of 69 graduate supervisors regarding issues in supervision from three higher education institutions in Australia. Factors that contribute to student success in higher education research degrees are many and diverse, including a complex dance of student factors, supervisor factors, and their supervisory context factors, and those informed by cultural and language differences. Therefore, a complex system approach using Bayesian network modelling was used to explore how student and/or supervisor factors influence the success of culturally and linguistically diverse (CALD) graduate students in Engineering and IT. Findings suggest that key factors include the experience of supervisors in terms of experience with the Australian higher education system, personal cross-cultural experience.
Resumo:
The development of hydrogels tailored for cartilage tissue engineering has been a research and clinical goal for over a decade. Directing cells towards a chondrogenic phenotype and promoting new matrix formation are significant challenges that must be overcome for the successful application of hydrogels in cartilage tissue therapies. Gelatin-methacrylamide (Gel-MA) hydrogels have shown promise for the repair of some tissues, but they have not been extensively investigated for cartilage tissue engineering. We encapsulated human chondrocytes in gel-MA based hydrogels, and show that with the incorporation of small quantities of photo-crosslinkable hyaluronic acid methacrylate (HA-MA), and to a lesser extent chondroitin sulfate methacrylate (CS-MA), chondrogenesis and mechanical properties can be enhanced. The addition of HA-MA to Gel-MA constructs resulted in more rounded cell morphologies, enhanced chondrogenesis as assessed by gene expression and immunofluorescence, and increased quantity and distribution of the newly synthesised ECM throughout the construct. Consequently, while the compressive moduli of control Gel-MA constructs increased by 26 kPa after 8 weeks culture, constructs with HA-MA and CS-MA increased by 96 kPa. The enhanced chondrogenic differentiation, distribution of ECM, and improved mechanical properties make these materials potential candidates for cartilage tissue engineering applications.
Resumo:
The transient leaf assay in Nicotiana benthamiana is widely used in plant sciences, with one application being the rapid assembly of complex multigene pathways that produce new fatty acid profiles. This rapid and facile assay would be further improved if it were possible to simultaneously overexpress transgenes while accurately silencing endogenes. Here, we report a draft genome resource for N. benthamiana spanning over 75% of the 3.1 Gb haploid genome. This resource revealed a two-member NbFAD2 family, NbFAD2.1 and NbFAD2.2, and quantitative RT-PCR (qRT-PCR) confirmed their expression in leaves. FAD2 activities were silenced using hairpin RNAi as monitored by qRT-PCR and biochemical assays. Silencing of endogenous FAD2 activities was combined with overexpression of transgenes via the use of the alternative viral silencing-suppressor protein, V2, from Tomato yellow leaf curl virus. We show that V2 permits maximal overexpression of transgenes but, crucially, also allows hairpin RNAi to operate unimpeded. To illustrate the efficacy of the V2-based leaf assay system, endogenous lipids were shunted from the desaturation of 18:1 to elongation reactions beginning with 18:1 as substrate. These V2-based leaf assays produced ~50% more elongated fatty acid products than p19-based assays. Analyses of small RNA populations generated from hairpin RNAi against NbFAD2 confirm that the siRNA population is dominated by 21 and 22 nt species derived from the hairpin. Collectively, these new tools expand the range of uses and possibilities for metabolic engineering in transient leaf assays. © 2012 Naim et al.
Resumo:
The expression patterns of GUS fusion constructs driven by the Agrobacterium rhizogenes RolC and the maize Sh (Shrunken: sucrose synthase-1) promoters were examined in transgenic potatoes (cv. Atlantic). RolC drove high-level gene expression in phloem tissue, bundle sheath cells and vascular parenchyma, but not in xylem or non-vascular tissues. Sh expression was exclusively confined to phloem tissue. Potato leafroll luteovirus (PLRV) replicates only in phloem tissues, and we show that when RolC is used to drive expression of the PLRV coat protein gene, virus-resistant lines can be obtained. In contrast, no significant resistance was observed when the Sh promoter was used.
Resumo:
Financial literacy may not be as effective as previously thought in protecting against fraud victimisation. It does not inoculate investors from persuasion or social engineering tactics used by offenders to secure investment in fraudulent schemes. In fact, recent research indicates that overconfidence in investment knowledge may make individuals more susceptible to fraud. Using boiler room fraud as a case study, this article introduces the PREY (Profiled, Relational, Exploitable and Yielding) model to capture the psychological tactics used by fraud perpetrators to influence the thoughts and decision-making processes of individuals. The PREY model operationalizes the tenets of social engineering and demonstrates how such tactics could be re-engineered to increase the effectiveness of fraud prevention within the financial literacy context.
Resumo:
BACKGROUND Research on engineering design is a core area of concern within engineering education and a fundamental understanding of how engineering students approach and undertake design is necessary in order to develop effective design models and pedagogies. Understanding the factors related to design experiences in education and how they affect student practice can help educators as well as designers to leverage these factors as part of the design process. PURPOSE This study investigated the design practices of first-year engineering students’ and their experiences with a first-year engineering course design project. The research questions that guided the investigation were: 1. From a student perspective, what design parameters or criteria are most important? 2. How does this perspective impact subsequent student design practice throughout the design process? DESIGN/METHOD The authors employed qualitative multi-case study methods (Miles & Huberman, 1994) in order to the answer the research questions. Participant teams were observed and video recorded during team design meetings in which they researched the background for the design problem, brainstormed and sketched possible solutions, as well as built prototypes and final models of their design solutions as part of a course design project. Analysis focused on explanation building (Yin, 2009) and utilized within-case and cross-case analysis (Miles & Huberman, 1994). RESULTS We found that students focused disproportionally on the functional parameter, i.e. the physical implementation of their solution, and the possible/applicable parameter, i.e. a possible and applicable solution that benefited the user, in comparison to other given parameters such as safety and innovativeness. In addition, we found that individual teams focused on the functional and possible/ applicable parameters in early design phases such as brainstorming/ ideation and sketching. When prompted to discuss these non-salient parameters (from the student perspective) in the final design report, student design teams often used a post-hoc justification to support how the final designs fit the parameters that they did not initially consider. CONCLUSIONS This study suggests is that student design teams become fixated on (and consequently prioritize) certain parameters they interpret as important because they feel these parameters were described more explicitly in terms how they were met and assessed. Students fail to consider other parameters, perceived to be less directly assessable, unless prompted to do so. Failure to consider other parameters in the early design phases subsequently affects their approach in design phases as well. Case studies examining students’ study strategies within three Australian Universities illustrate similarities with some student approaches to design.
Resumo:
"The National Disability Insurance Scheme (NDIS) was launched on 1 July 2013. The NDIS Act 2013 is an historic piece of legislation that is the foundation for a national scheme which will deliver meaningful change for people with disabilities across Australia. The NDIS seeks to support the independence and social and economic participation of people with a disability, mainly by funding the provision of reasonable and necessary supports, including early intervention supports. The NDIS establishes three main criteria for access to the scheme - age, residence and disability. The National Disability Insurance Scheme Handbook written by Bill Madden, Janine McIlwraith and Ruanne Brell examines the NDIS from the viewpoint of a person seeking to access the NDIS and those advising or assisting them. The three key criteria are examined, along with the powers of the NDIS Chief Executive Officer and the scope for review of adverse decisions. The important area of interplay between the NDIS and compensation entitlements is carefully scrutinised. This handbook provides scheme users, carers, lawyers and health practitioners with an easy to understand guide to this watershed legal development."--Publisher website
Resumo:
Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
Joint venture design teams are formed to combine resources and expertise in order to secure multi-discipline engineering design services on major projects. Bringing together resources from two ordinarily competing companies to form one joint team is however challenging as each parent company brings to the project its own organisational culture, processes and team attitudes. This study examined the factors that impact on forming a successful joint venture project team. Three critical areas were identified from an extensive literature review; Joint Venture Arrangements, Parent Companies and Forming the Team; and a survey was conducted with professionals who have worked in joint venture project teams in the Australian building industry in order to identify factors that affected successful joint venture team formation, and the common lessons learnt. This study reinforced the importance of three key criteria - trust, commitment and compatibility - for partner alignment. The results also identified four key lessons learnt which included; selecting the right resources, enabling a collaborative working environment by way of project office, implementing an independent Joint Venture Manager, and allocating work which is best for project with fees reflecting risk where risk is disproportionate.
Resumo:
Nanomaterials are prone to influence by chemical adsorption because of their large surface to volume ratios. This enables sensitive detection of adsorbed chemical species which, in turn, can tune the property of the host material. Recent studies discovered that single and multi-layer molybdenum disulfide (MoS2) films are ultra-sensitive to several important environmental molecules. Here we report new findings from ab inito calculations that reveal substantially enhanced adsorption of NO and NH3 on strained monolayer MoS2 with significant impact on the properties of the adsorbates and the MoS2 layer. The magnetic moment of adsorbed NO can be tuned between 0 and 1 μB; strain also induces an electronic phase transition between half-metal and metal. Adsorption of NH3 weakens the MoS2 layer considerably, which explains the large discrepancy between the experimentally measured strength and breaking strain of MoS2 films and previous theoretical predictions. On the other hand, adsorption of NO2, CO, and CO2 is insensitive to the strain condition in the MoS2 layer. This contrasting behavior allows sensitive strain engineering of selective chemical adsorption on MoS2 with effective tuning of mechanical, electronic, and magnetic properties. These results suggest new design strategies for constructing MoS2-based ultrahigh-sensitivity nanoscale sensors and electromechanical devices.
Resumo:
This research identifies factors that are crucial to the success of a knowledge management system (KMS) implementation in a prominent Australian engineering consultancy firm. The study employs the Delphi method to solicit the opinions of experienced market leaders in the Australian construction industry, and then benchmarks the organisational profile of the consultancy firm against the Delphi findings. From this comparative case study, recommendations are made pertaining to the organisational and cultural changes required within the consultancy firm in order to improve its readiness to successfully implement a KMS.